Analysis

  • max time kernel
    121s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    29/06/2024, 13:30

General

  • Target

    ad71d29cc7f9cdb8693a1e34fdf5169ae32a07930890a63c5fc6cb2fec65f3c4_NeikiAnalytics.dll

  • Size

    76KB

  • MD5

    8e46d8327b2581db911b3b17f2253110

  • SHA1

    09675120c1b30220e83b9489b665c208ad7743ab

  • SHA256

    ad71d29cc7f9cdb8693a1e34fdf5169ae32a07930890a63c5fc6cb2fec65f3c4

  • SHA512

    9a47118405d7387f29b3c13b9a26468cf9debd9c6e6e81b6e59d5cfe7def8d8bb244c8fcca613c47551f4faf9de7b1db9077d817f6c0792c0585f23d289aaf69

  • SSDEEP

    1536:KQ2lOQ2Q8U2cBGy/f/NnEdp/XUG6b87CkcbO1loTtMRz59:Z2+fHMGy/fG2kc2yTt29

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\ad71d29cc7f9cdb8693a1e34fdf5169ae32a07930890a63c5fc6cb2fec65f3c4_NeikiAnalytics.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2536
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\ad71d29cc7f9cdb8693a1e34fdf5169ae32a07930890a63c5fc6cb2fec65f3c4_NeikiAnalytics.dll,#1
      2⤵
        PID:2700

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads